Category: SOC News
-
Elevate Your Threat Hunting with JARM
Elevate Your Threat Hunting with JARM> – David Ratner Threat hunting is an invaluable security practice for any modern enterprise. It is an active and […]
-
Broken zippers: Detecting deception with Google’s new ZIP domains
Broken zippers: Detecting deception with Googleâs new ZIP domains The blog post from Red Canary explains how Google is using its g.co and g.zip domains […]
-
Join the hunt: Threat hunting for proactive cyber defense (Part 2 of 2)
Join the hunt: Threat hunting for proactive cyber defense (Part 2 of 2)> In this article, the author discusses “threat hunting” and its importance for […]
-
Building new relevance in managed security will be key to channel success in 2022 – ARN
Building new relevance in managed security will be key to channel success in 2022 – ARN> The managed security market is becoming increasingly crowded, with […]
-
Three ways to reduce complexity in security operations | SC Media
Three ways to reduce complexity in security operations | SC Media> – Kevin Kirkwood / 1. Automate Tasks: Automating manual and labor-intensive tasks can help […]
-
Threat Hunting with Malwoverview and Tines – Malware Analysis – Malware Analysis, News and Indic…
Threat Hunting with Malwoverview and Tines – Malware Analysis – Malware Analysis, News and Indic…> – MalBot Threat hunting with Malwoverview and Tines is a […]
-
OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain – Source: www.sec…
OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain â Source: www.sec… OWASP SWSec-5D Tool provides SDLC Maturity Ratings Aids Software Supply […]
-
Don’t Risk Your Business – This Best Threat Intelligence Software Is All You Need
Donât Risk Your Business – This Best Threat Intelligence Software Is All You Need> – BrandMedia The threat of cyberattacks on business data is a […]
-
The Department of Homeland Security: At the Intersection of Customer Experience and Cybersecurit…
The Department of Homeland Security: At the Intersection of Customer Experience and Cybersecurit… The Department of Homeland Security (DHS) is at the intersection of customer […]
-
The Validated Canary: Unearthing changes in our detection engine with Coalmine
The Validated Canary: Unearthing changes in our detection engine with Coalmine – George Allen We use several existing tools for detection validation, including the well […]
Categories
- AI / ML
- AIOps
- IT/OT News
- Open Source
- Security Industry News
- Security Strategy News
- SOC News
- Zero Trust
Recent Posts
- North Korean hacker group using false coding tests to spread malware
- OpenBAS: Open-source breach and attack simulation platform
- Introducing Squadcast’s Intelligent Alert Grouping and Snooze Notifications
- Effective Data Security Audit for Big Data Systems – DZone
Tags
There’s no content to show here yet.